Bell Labs Technical Journal

Cover image for Vol. 12 Issue 3

Special Issue: Information Technology/Network Security

Autumn (Fall) 2007

Volume 12, Issue 3

Pages 1–213

Issue edited by: Carlos Solari

  1. Research Articles

    1. Top of page
    2. Research Articles
    1. Designing for security (pages 1–6)

      Carlos Solari

      Version of Record online: 6 NOV 2007 | DOI: 10.1002/bltj.20245

    2. Building secure products and solutions (pages 21–38)

      Ashok K. Gupta, Uma Chandrashekhar, Suhasini V. Sabnis and Frank A. Bastry

      Version of Record online: 6 NOV 2007 | DOI: 10.1002/bltj.20247

    3. Using the Bell Labs security framework to enhance the ISO 17799/27001 information security management system (pages 39–54)

      Andrew R. McGee, Frank A. Bastry, Uma Chandrashekhar, S. Rao Vasireddy and Lori A. Flynn

      Version of Record online: 6 NOV 2007 | DOI: 10.1002/bltj.20248

    4. Comparing reliability and security: Concepts, requirements, and techniques (pages 65–78)

      Robert S. Hanmer, Donald T. McBride and Veena B. Mendiratta

      Version of Record online: 6 NOV 2007 | DOI: 10.1002/bltj.20250

    5. IP-based radio access network implementation cost vs. network security trade-off (pages 95–99)

      Seyong Park and Alexandro Salvarani

      Version of Record online: 6 NOV 2007 | DOI: 10.1002/bltj.20252

    6. Evros: A service-delivery platform for extending security coverage and IT reach (pages 101–119)

      Dimitrios Stiliadis, Andrea Francini, Sanjay Kamat, Mansoor Alicherry, Adiseshu Hari, Pramod V. Koppol, Ashok K. Gupta and Dor Skuler

      Version of Record online: 6 NOV 2007 | DOI: 10.1002/bltj.20253

    7. The need for a multi-perspective approach to solve the DDos problem (pages 121–130)

      Jorge Hernandez-Herrero and Jon A. Solworth

      Version of Record online: 6 NOV 2007 | DOI: 10.1002/bltj.20254

    8. Man-in-the-middle attacks on auto-updating software (pages 131–138)

      Bjoern M. Luettmann and Adam C. Bender

      Version of Record online: 6 NOV 2007 | DOI: 10.1002/bltj.20255

    9. Polymorphic malware detection and identification via context-free grammar homomorphism (pages 139–147)

      Gerald R. Thompson and Lori A. Flynn

      Version of Record online: 6 NOV 2007 | DOI: 10.1002/bltj.20256

    10. Understanding and preventing network device fingerprinting (pages 149–166)

      Lloyd G. Greenwald and Tavaris J. Thomas

      Version of Record online: 6 NOV 2007 | DOI: 10.1002/bltj.20257

    11. Aspects of network security for VoIP solutions using IMS core network and Wi-Fi access (pages 167–185)

      Ruth S. Gayde, Stinson S. Mathai and Kevin Wang

      Version of Record online: 6 NOV 2007 | DOI: 10.1002/bltj.20258

    12. Common security management for CDMA2000 1x and 1x EV-DO networks (pages 187–203)

      Andrew C. Clark and Karen E. Plonty

      Version of Record online: 6 NOV 2007 | DOI: 10.1002/bltj.20259

    13. Recent Alcatel-Lucent patents (pages 205–213)

      Version of Record online: 6 NOV 2007 | DOI: 10.1002/bltj.20261

SEARCH

SEARCH BY CITATION